[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115690955B - Digital key safety authentication method and device, vehicle and digital key equipment - Google Patents

Digital key safety authentication method and device, vehicle and digital key equipment Download PDF

Info

Publication number
CN115690955B
CN115690955B CN202211334015.2A CN202211334015A CN115690955B CN 115690955 B CN115690955 B CN 115690955B CN 202211334015 A CN202211334015 A CN 202211334015A CN 115690955 B CN115690955 B CN 115690955B
Authority
CN
China
Prior art keywords
key
vehicle
digital key
preset
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211334015.2A
Other languages
Chinese (zh)
Other versions
CN115690955A (en
Inventor
宁廷聪
汪向阳
张贤
谭成宇
张科强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Changan Automobile Co Ltd
Original Assignee
Chongqing Changan Automobile Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Changan Automobile Co Ltd filed Critical Chongqing Changan Automobile Co Ltd
Priority to CN202211334015.2A priority Critical patent/CN115690955B/en
Publication of CN115690955A publication Critical patent/CN115690955A/en
Application granted granted Critical
Publication of CN115690955B publication Critical patent/CN115690955B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The application relates to the technical field of automobiles, in particular to a safety authentication method and device of a digital key, a vehicle and digital key equipment, wherein the method comprises the following steps: extracting a channel characteristic value of wireless communication between the vehicle and the digital key equipment; generating equipment fingerprints according to the channel characteristic values, and establishing a preset safety channel between a vehicle and digital key equipment after verifying that the digital key is a preset legal key based on the equipment fingerprints; receiving a session maintaining message sent by the digital key equipment at intervals of preset time, and after verifying that the digital key is a preset legal key according to the session maintaining message, maintaining the preset safety channel in a preset session state, or disconnecting the preset safety channel. Therefore, the problems that the vehicle is connected by an illegal digital key to perform the operation of controlling the vehicle, the safety and the privacy of data in the vehicle cannot be ensured and the like are solved.

Description

Digital key safety authentication method and device, vehicle and digital key equipment
Technical Field
The application relates to the technical field of automobiles, in particular to a safety authentication method and device of a digital key, a vehicle and digital key equipment.
Background
Automobile keys undergo development stages such as mechanical keys, chip keys, remote keys, intelligent keys and the like, and each development stage is developed towards the direction of convenience and intelligence in use of users. The remote control key, the intelligent starting system, the digital key APP (Application program) and the like generated based on the automobile electronic equipment enable the use of the automobile to be more and more convenient.
The digital car key is used as a vertical technology under intelligent car li leather, so that car owners can go through intelligent internal running machines, wearing equipment and the like to unlock the car, and associated car control operation is carried out on the car, so that the car convenience is improved, and the car key is subjected to be concerned about of more and more car enterprises.
However, in the scenario of using the digital key, the validity of the user identity cannot be ensured, and the illegal user may impersonate other legal users to obtain the relevant authority, so that the data is illegally stolen and read in the communication, and meanwhile, the correct execution of the vehicle control instruction cannot be ensured.
Disclosure of Invention
The application provides a safety authentication method and device of a digital key, a vehicle and digital key equipment, and aims to solve the problems that illegal digital key connection vehicles perform a vehicle control operation and the safety and privacy of data in the vehicles cannot be guaranteed.
An embodiment of a first aspect of the present application provides a security authentication method for a digital key, the method being applied to a vehicle, including the steps of: extracting a channel characteristic value of wireless communication between the vehicle and the digital key equipment; generating equipment fingerprints according to the channel characteristic values, and establishing a preset safety channel between the vehicle and the digital key equipment after verifying that the digital key is a preset legal key based on the equipment fingerprints; and receiving a session maintaining message sent by the digital key equipment at intervals of preset time, and after verifying that the digital key is a preset legal key according to the session maintaining message, maintaining the preset safety channel in a preset session state, otherwise, disconnecting the preset safety channel.
According to the technical means, the embodiment of the application can generate the equipment fingerprint according to the channel characteristic value of the wireless communication between the vehicle and the digital key, establish the safety channel by using the equipment fingerprint, and then perform standard authentication, so that a layer of safety channel is established on the basis of the traditional safety authentication, the traffic control operation by illegal users is avoided, and the safety and privacy of information in the communication process are improved.
Optionally, the session maintenance message includes a random number, a timestamp, and an identity verification code MAC value of the digital key, and after verifying that the digital key is a preset legal key according to the session maintenance message, the preset security channel is maintained in a preset session state, otherwise, the preset security channel is disconnected, and further including: checking whether the time stamp meets a preset condition; if the time stamp meets the preset condition, performing MAC calculation according to the random number and the time stamp to obtain an actual MAC value; if the actual MAC value is consistent with the MAC value of the session maintenance message, verifying that the digital key is a preset legal key, maintaining the preset safety channel in a preset session state, otherwise verifying that the digital key is a preset illegal key, and disconnecting the preset safety channel.
According to the technical means, the embodiment of the application can calculate the MAC (MessageAuthentication Code, identity check code) value according to the random number and the timestamp, and compare and judge whether the MAC value is consistent with the MAC value of the session maintenance message, thereby judging whether the digital key is legal or not, establishing a safety channel, and avoiding illegal users from connecting the vehicle to carry out the operation control operation.
Optionally, after verifying that the digital key is a preset legal key based on the device fingerprint, establishing a preset security channel between the vehicle and the digital key device, further includes: encrypting a first identifier of the digital key device by using the device fingerprint to obtain key information; the key information is sent to the vehicle, wherein the vehicle decrypts the key information according to the equipment fingerprint to obtain the first identifier, queries a first preset white list according to the first identifier, and encrypts the vehicle identifier of the vehicle by using the equipment fingerprint if the digital key is obtained by querying, so as to obtain the vehicle information; and receiving the vehicle information, decrypting the vehicle information by using the device fingerprint to obtain the vehicle identifier, inquiring a second preset white list according to the vehicle identifier, and if the vehicle is obtained by inquiring, establishing a preset safety channel between the vehicle and the digital key device.
According to the technical means, the first identifier sent by the digital key can be decrypted by using the device fingerprint, key information is obtained, the vehicle device inquires key information in the white list, if the key information exists, the device fingerprint is used for encrypting the vehicle identifier, the device fingerprint is used for decrypting the vehicle information, the white list is inquired, after the key information exists, a safety channel is established, and the safety channel is established through double encryption and decryption, so that the safety of vehicle connection is ensured.
Optionally, before receiving the session maintenance message sent by the digital key device at intervals of a preset duration, the method further includes: transmitting a vehicle-side random number and an IV value to the digital key device, and receiving an application identifier of a digital key, a key-side random number, key information and a key ciphertext generated by encrypting the vehicle-side random number and the key-side random number, which are transmitted by the digital key device; calculating a digital key according to the application identifier, the key side random number and the key information, deriving a communication key from the digital key, decrypting the key ciphertext by using the communication key, and encrypting and generating a vehicle end ciphertext according to the counting information of a key counter of the digital key and the vehicle side random number if the decrypted information is consistent with the vehicle side random number and the key side random number; the vehicle end ciphertext is sent to the digital key device, wherein the digital key device derives a communication key from a digital key, decrypts the vehicle end ciphertext by using the communication key, completes identity security authentication of the vehicle at the key side if the decrypted information is consistent with the counting information of the key counter and the vehicle side random number, calculates to obtain a key side session key according to the communication key, the IV value and the hash value of the vehicle side random number, and encrypts the vehicle side random number by using the key side session key to obtain a session ciphertext; and calculating according to the communication key, the IV value and the hash value of the vehicle-side random number to obtain a vehicle-side session key, decrypting the session ciphertext by using the vehicle-side session key, and if the decrypted information is consistent with the vehicle-side random number, completing identity security authentication of the digital key on the vehicle side.
According to the technical means, the embodiment of the application can realize the identity security authentication of the vehicle and the digital key by the bidirectional identity authentication of the vehicle side and the key side and generating a session key for encrypting/decrypting the vehicle control instruction, thereby avoiding the connection of illegal users, improving the security of vehicle data and ensuring the information security in double layers.
Optionally, before extracting the channel characteristic value of the wireless communication between the vehicle and the digital key device, the method further comprises: receiving a pairing request of digital key equipment; and pairing with the digital key equipment according to the pairing request.
According to the technical means, the embodiment of the application needs to pair with the digital key device according to the pairing request of the digital key, so that the characteristic value of the channel for the communication between the vehicle and the digital key device is extracted for subsequent security authentication.
An embodiment of the second aspect of the present application provides a security authentication method for a digital key, the method being applied to a digital key device, the method comprising the steps of: extracting a channel characteristic value of wireless communication between a vehicle and the digital key equipment; generating equipment fingerprints according to the channel characteristic values, and establishing a preset safety channel between the vehicle and the digital key equipment after verifying that the vehicle is a preset legal vehicle based on the equipment fingerprints; and sending a session maintaining message to the vehicle at intervals of a preset duration, wherein the vehicle verifies that the digital key is a preset legal key according to the session maintaining message, and then keeps the preset safety channel in a preset session state, and otherwise, disconnects the preset safety channel.
An embodiment of a third aspect of the present application provides a security authentication device for a digital key, the device being applied to a vehicle, including: the first extraction module is used for extracting a channel characteristic value of wireless communication between the vehicle and the digital key equipment; the first establishing module is used for generating equipment fingerprints according to the channel characteristic values, and establishing a preset safety channel between the vehicle and the digital key equipment after verifying that the digital key is a preset legal key based on the equipment fingerprints; the first verification module is used for receiving a session maintaining message sent by the digital key equipment at intervals of preset time, and after verifying that the digital key is a preset legal key according to the session maintaining message, keeping the preset safety channel in a preset session state, otherwise, disconnecting the preset safety channel.
An embodiment of a fourth aspect of the present application provides a security authentication apparatus for a digital key, the apparatus being applied to a digital key device, including: the second extraction module is used for extracting a channel characteristic value of wireless communication between the vehicle and the digital key equipment; the second establishing module is used for generating equipment fingerprints according to the channel characteristic values, and establishing a preset safety channel between the vehicle and the digital key equipment after verifying that the vehicle is a preset legal vehicle based on the equipment fingerprints; and the second verification module is used for sending a session maintenance message to the vehicle at intervals of preset time, wherein the vehicle verifies that the digital key is a preset legal key according to the session maintenance message and then keeps the preset safety channel in a preset session state, and otherwise, the preset safety channel is disconnected.
A fifth aspect of the present application provides a vehicle including: the device comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the program to realize the security authentication method of the digital key according to the embodiment.
An embodiment of a sixth aspect of the present application provides a digital key device, including: the digital key security authentication method comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the program to realize the digital key security authentication method according to the embodiment.
Therefore, the application has at least the following beneficial effects:
(1) According to the embodiment of the application, the device fingerprint can be generated according to the channel characteristic value of wireless communication between the vehicle and the digital key, the device fingerprint is utilized to establish a safety channel, then standard authentication is carried out, one layer of safety channel is additionally established on the basis of traditional safety authentication, the illegal user is prevented from carrying out the operation of controlling the vehicle, and the safety and privacy of information in the communication process are improved.
(2) According to the embodiment of the application, the MAC value can be calculated according to the random number and the time stamp, and the MAC value is compared with the MAC value of the session maintenance message to judge whether the session maintenance message is consistent, so that whether the digital key is legal or not is judged, and a safety channel is established, thereby avoiding illegal users from connecting the vehicle to perform the vehicle control operation.
(3) According to the embodiment of the application, the first identifier sent by the digital key can be decrypted by using the device fingerprint to obtain the key information, the vehicle device inquires the key information in the white list, if the key information exists, the device fingerprint is used for encrypting the vehicle identifier, the device fingerprint is used for decrypting the vehicle information, the white list is inquired, after the key information exists, a safety channel is established, and the safety channel is established through double encryption and decryption, so that the safety of vehicle connection is ensured.
(4) The embodiment of the application can realize the identity security authentication of the vehicle and the digital key by the bidirectional identity authentication of the vehicle side and the key side and generate a session key for encrypting/decrypting the vehicle control instruction, thereby avoiding the connection of illegal users, improving the security of the vehicle data and ensuring the information security in double layers.
(5) According to the embodiment of the application, the pairing request of the digital key is needed to be paired with the digital key device, so that the characteristic value of the channel for the communication between the vehicle and the digital key device is extracted for subsequent security authentication.
Additional aspects and advantages of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the application.
Drawings
The foregoing and/or additional aspects and advantages of the application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
fig. 1 is a flowchart of a security authentication method of a digital key according to an embodiment of the present application;
FIG. 2 is a flow chart of a digital key security authentication and encryption method according to an embodiment of the present application;
FIG. 3 is a flow chart of a digital key and vehicle security channel establishment provided in accordance with an embodiment of the present application;
FIG. 4 is a flow chart of a digital key and a vehicle for standard security authentication according to an embodiment of the present application;
FIG. 5 is a flowchart of a method for secure authentication of a digital key according to an embodiment of the present application;
FIG. 6 is a block diagram of a digital key security authentication device according to an embodiment of the present application;
FIG. 7 is a block diagram of a digital key security authentication device according to an embodiment of the present application;
fig. 8 is a schematic view of a vehicle structure provided according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative and intended to explain the present application and should not be construed as limiting the application.
The related art realizes the safety authentication of the digital key by the following method:
(1) Based on PKI (Public KeyInfrastructure ) technology, in the verification process of both sides, a signature algorithm is adopted to extract the abstract from the digital key, the abstract and the digital key are encrypted and decrypted by the keys of both sides respectively, the corresponding relation between the abstract and the digital key obtained through authentication and decryption is compared with whether the digital key obtained through decryption is consistent with the digital key recorded in the database, and the aim of identity security authentication is achieved.
(2) The device fingerprint is used for protecting the user password, and a message digest algorithm is used for generating a new local key for network management message authentication and encryption. In the process of message authentication, a new local key is adopted to calculate a message verification code for the message, message signature authentication is completed, and in the process of message encryption, the new local key is adopted to encrypt a message data unit, so that communication privacy is protected.
None of the above methods, however, involve the establishment of a secure channel and the dual verification of the digital key and the identity of the vehicle.
The following describes a security authentication method and device for a digital key, a vehicle and a digital key device according to embodiments of the present application with reference to the accompanying drawings. Aiming at the problems that in the background technology, the legitimacy of the user identity can not be confirmed under the condition that the user uses the digital key, and the illegal user can impersonate the legal user to acquire relevant authority and operate the vehicle and cannot guarantee the safety of vehicle data, the application provides a safety authentication method of the digital key. Therefore, the problems that the illegal digital key is connected with the vehicle and is used for controlling the vehicle, the safety and the privacy of the data and the information of the vehicle cannot be guaranteed and the like are solved.
Specifically, fig. 1 is a flow chart of a security authentication method of a digital key according to an embodiment of the present application.
As shown in fig. 1, the security authentication method of the digital key is applied to a vehicle and comprises the following steps:
in step S101, a channel characteristic value of wireless communication between the vehicle and the digital key device is extracted.
In an embodiment of the present application, before extracting a channel characteristic value of wireless communication between a vehicle and a digital key device, the method further includes: receiving a pairing request of digital key equipment; pairing with the digital key device according to the pairing request.
It can be appreciated that after receiving the pairing request of the digital key, the embodiment of the application can extract the channel characteristic value of the wireless communication between the vehicle and the digital key device so as to carry out subsequent security authentication.
In step S102, an equipment fingerprint is generated according to the channel characteristic value, and after verifying that the digital key is a preset legal key based on the equipment fingerprint, a preset security channel between the vehicle and the digital key equipment is established.
The device fingerprint is used for extracting the channel characteristic value according to the difference of signals in the wireless channel to generate a unique identification code, and has uniqueness, inherent property and tamper resistance.
It can be understood that the embodiment of the application verifies the legitimacy of the digital key according to the device fingerprint, thereby establishing a secure channel.
In the embodiment of the application, after verifying that the digital key is a preset legal key based on the device fingerprint, a preset safety channel between the vehicle and the digital key device is established, and the method further comprises the following steps: encrypting a first identifier of the digital key device by using the device fingerprint to obtain key information; the method comprises the steps of sending key information to a vehicle, wherein the vehicle obtains a first identifier according to equipment fingerprint decryption key information, inquires a first preset white list according to the first identifier, and encrypts the vehicle identifier of the vehicle by the equipment fingerprint if a digital key is obtained through inquiry to obtain vehicle information; and receiving the vehicle information, decrypting the vehicle information by using the device fingerprint to obtain a vehicle identifier, inquiring a second preset white list according to the vehicle identifier, and if the vehicle is inquired, establishing a preset safety channel between the vehicle and the digital key device.
The device fingerprint can encrypt the device and decrypt the information of the device; the first identification means information that can identify the digital key device, and can be set as an ID of the digital key device; the vehicle identification means information that can identify the vehicle device, and can be set as an ID of the vehicle device; the first preset white list refers to a list library for storing digital key information; the second preset white list refers to a list library storing vehicle information.
It may be understood that, in the embodiment of the present application, the device fingerprint is generated by collecting the characteristic value of the channel through the vehicle device, the device fingerprint is used as the algorithm key, the data sent by the digital key is decrypted, the device ID of the digital key is obtained, the vehicle device queries key information in the first preset whitelist, if yes, the device ID value of the vehicle is encrypted by using the device fingerprint as the key, the digital key is sent, if not, the connection is disconnected, the digital key obtains the device ID of the vehicle, if yes, the establishment of the security channel is determined, the subsequent operation is performed, and if not, the connection is disconnected. By double verification of the digital key information and the vehicle information of the vehicle equipment and the digital key relative to each other, the legitimacy of the equipment can be ensured, and a safe communication channel is constructed.
In step S103, a session maintenance message sent by the digital key device at intervals of a preset duration is received, and after verifying that the digital key is a preset legal key according to the session maintenance message, the preset security channel is maintained in a preset session state, otherwise, the preset security channel is disconnected.
In the embodiment of the application, before receiving the session maintenance message sent by the digital key device at intervals of a preset duration, the method further comprises the following steps: transmitting the vehicle-side random number and the IV value to the digital key device, and receiving an application identifier of the digital key, the key-side random number, key information and a key ciphertext generated based on encryption of the vehicle-side random number and the key-side random number, which are transmitted by the digital key device; calculating a digital key according to the application identifier, the key side random number and the key information, deriving a communication key from the digital key, decrypting a key ciphertext by using the communication key, and encrypting and generating a vehicle end ciphertext according to the counting information of a key counter of the digital key and the vehicle side random number if the decrypted information is consistent with the vehicle side random number and the key side random number; the vehicle-end ciphertext is sent to digital key equipment, wherein the digital key equipment derives a communication key from the digital key, decrypts the vehicle-end ciphertext by using the communication key, completes identity security authentication of a vehicle at a key side if the decrypted information is consistent with counting information of a key counter and a vehicle-side random number, calculates to obtain a key-side session key according to the communication key, an IV value and a hash value of the vehicle-side random number, and encrypts the vehicle-side random number by using the key-side session key to obtain a session ciphertext; and calculating according to the communication key, the IV value and the hash value of the vehicle-side random number to obtain a vehicle-side session key, decrypting a session ciphertext by using the vehicle-side session key, and if the decrypted information is consistent with the vehicle-side random number, completing identity security authentication of the digital key on the vehicle side.
It can be understood that in the embodiment of the application, firstly, a random number is obtained from a vehicle for authenticating a digital key, the vehicle side transmits the vehicle side random number and the IV value to the key side, the application identifier, the random number and the key information of the key are obtained, meanwhile, the key side derives a communication secret key through the digital secret key, the key side random number and the vehicle side random number are encrypted into ciphertext through a symmetric algorithm (AES 128), and the ciphertext is transmitted to the vehicle side. And secondly, the vehicle end adopts a dispersion algorithm, calculates a digital secret key by using an application identifier, a random number and key information acquired from the key, derives a communication secret key from the digital secret key, decrypts a key ciphertext, compares the key ciphertext, and if the comparison is successful, sends a ciphertext formed by the key counter and the key random number to the digital key. And finally, through mutual authentication of the vehicle side and the key side, a session key is generated for encrypting/decrypting the vehicle control instruction. The key decrypts the cipher text of the vehicle end by using the communication secret key and compares the cipher text, if the data is correct, the communication secret key is adopted to decrypt, the IV value and the hash value of the vehicle side random number are used for calculating the session secret key, the encrypted vehicle side random number is used for being sent to the vehicle end, the vehicle end adopts the communication secret key, the IV value and the hash value of the vehicle side random number to calculate the session secret key, the cipher text of the key is decrypted and compared, if the data is correct, the security authentication is successful, and otherwise, the authentication is failed. In conclusion, the legitimacy of the digital key access is ensured through the bidirectional identity authentication of the vehicle side and the key side, the illegal digital key access to the vehicle is avoided, and the safety of vehicle data is ensured.
In the embodiment of the application, the session maintenance message comprises a random number, a time stamp and an identity verification code (MAC) value of the digital key, and after verifying that the digital key is a preset legal key according to the session maintenance message, the preset security channel is maintained in a preset session state, otherwise, the preset security channel is disconnected, and the method further comprises the steps of: checking whether the time stamp meets a preset condition; if the time stamp meets the preset condition, performing MAC calculation according to the random number and the time stamp to obtain an actual MAC value; if the actual MAC value is consistent with the MAC value of the session maintenance message, verifying that the digital key is a preset legal key, maintaining the preset security channel in a preset session state, otherwise verifying that the digital key is a preset illegal key, and disconnecting the preset security channel.
The session maintenance message is composed of a random number, a time stamp and a MAC value, and the MAC value can be generated by performing MAC calculation on the random number and the time stamp by a session key.
It can be understood that after the vehicle end obtains the session maintenance message, the time stamp is checked, if the check is successful, the random number and the time stamp are adopted to perform the MAC calculation, the received MAC value and the generated MAC value are compared, if the check is consistent, the check is successful, the digital key is judged to be a legal key, the vehicle end is kept in a state of being connected with the key, and otherwise, the connection is disconnected.
The vehicle after passing the security authentication can periodically receive the session maintenance message sent by the digital key and check the session maintenance message until the connection is closed, so as to prevent the illegal vehicle control command sent by the simulated legal key after passing the security authentication.
The following will describe a method for authenticating security of a digital key according to an embodiment, as shown in fig. 2, which includes the following steps:
step S11: pairing preparation stage of digital key and vehicle
When the digital key is used, the APP can extract Bluetooth pairing information of the target vehicle and search Bluetooth equipment of the target vehicle in BLEDKINFO, and once the target vehicle is searched, the mobile phone APP can automatically complete Bluetooth data pairing.
Step S12: digital key and vehicle security channel establishment
As shown in fig. 3, the establishment of the secure channel between the digital key and the vehicle includes:
step S21: digital key generating device fingerprint, and key information is sent
And the digital key collects the characteristic value of the channel to generate a device fingerprint, the device fingerprint is used as a symmetric algorithm key, the device ID is encrypted, and the ciphertext is sent to the vehicle device.
Step S22: vehicle generating device fingerprint, acquiring key information
The vehicle equipment collects the characteristic value of the channel to generate equipment fingerprint, the equipment fingerprint is used as an algorithm key, the data sent by the digital key is decrypted, and the equipment ID of the digital key is obtained.
Step S23: checking digital key information for vehicle equipment
The vehicle equipment inquires key information in the equipment white list, if the key information exists, the equipment fingerprint is used as a key to encrypt the ID value of the vehicle equipment, a digital key is sent, and if the key information exists, the vehicle equipment is disconnected.
Step S24: digital key for checking vehicle information
The digital key acquires the ID of the vehicle equipment, inquires whether the ID exists in the white list, if so, completes the establishment of a safety channel, carries out standard safety authentication, and otherwise, disconnects.
Step S13: digital key and vehicle standard security authentication
As shown in fig. 4, according to the authentication request, the digital key performs standard security authentication with the vehicle, including:
Step S31: security application-Select for optional vehicle
Select is used to Select a secure application in the vehicle-side container via AID.
Step S32: secure application of Select key-Select
Select is used to Select a secure application in the key container by AID.
Step S33: obtaining random number-GETCHALLENGE of vehicle end
GETCHALLENGE are used to obtain a random number (READERRND) from the security application for authentication of the digital key.
Step S34: acquisition of processing data-GetProcessData
GetProcessData are used to obtain one or more basic objects from the key. In the process, the vehicle end transmits the vehicle-side random number and the IV value to the key side, the application identifier, the random number and the key information of the key are obtained, meanwhile, the key side derives a communication key through a digital key, the key-side random number and the vehicle-side random number are encrypted into ciphertext through a symmetric algorithm (AES 128), and the ciphertext is sent to the vehicle end.
Step S35: verification process data-VerifyProcessData
VerifyProcessData are used to verify the process data returned by the key side. In the process, a vehicle end adopts a dispersion algorithm, a digital key is calculated by using an application identifier, a random number and key information acquired from a key, a communication key is derived from the digital key, a key ciphertext is decrypted for comparison, and if the comparison is successful, the counting information of a key counter and the key random number are formed into the ciphertext and are sent to the digital key.
Step S36: acquiring authentication data-GetAuthData
GetAuthData is used for finishing bidirectional identity authentication of the vehicle side and the key side, and generating a session key for encrypting/decrypting the vehicle control instruction. In the process, the key decrypts the vehicle-side ciphertext by using the communication key and compares the encrypted vehicle-side ciphertext, and if the data is correct, the session key is calculated by using the communication key, the IV finger and the hash value of the vehicle-side random number and is used for encrypting the vehicle-side random number and sending the encrypted vehicle-side random number to the vehicle-side.
Step S37: verification authentication data-VerifyAuthData
VerifyAuthData is used for finishing bidirectional identity authentication of the vehicle side and the key side, and generating a session key for encrypting/decrypting the vehicle control instruction. In the process, the vehicle end calculates a session key by adopting a communication key, an IV finger and a hash value of a vehicle-side random number, decrypts the ciphertext of the key and compares the ciphertext, returns successful security authentication if the ciphertext is correct, and otherwise, the session is ended.
Step S14: session maintenance between digital key and vehicle after authentication is successful
And the vehicle after passing the security authentication periodically receives a session maintenance message sent by the Bluetooth digital key and verifies the session maintenance message until the connection is closed.
According to the digital key safety authentication method provided by the embodiment of the application, the device fingerprint can be generated according to the channel characteristic value of the wireless communication between the vehicle and the digital key, the safety channel is established by using the device fingerprint, then standard authentication is carried out, one layer of safety channel is additionally established on the basis of the traditional safety authentication, the traffic control operation by an illegal user is avoided, and the safety and privacy of information in the communication process are improved; the MAC value can be calculated according to the random number and the time stamp, and the MAC value is compared with the MAC value of the session maintenance message to judge whether the session maintenance message is consistent, so that whether the digital key is legal is judged, a safety channel is established, and the illegal user is prevented from connecting the vehicle to perform the operation of controlling the vehicle; the first identifier sent by the digital key can be decrypted by using the device fingerprint to obtain key information, the vehicle device inquires the key information in the white list, if the key information exists, the device fingerprint is used for encrypting the vehicle identifier, the device fingerprint is used for decrypting the vehicle information, the white list is inquired, after the key information exists, a safety channel is established, and the safety channel is established through double encryption and decryption, so that the safety of vehicle connection is ensured; the two-way identity authentication of the vehicle side and the key side can be used for generating a session key for encrypting/decrypting the vehicle control instruction, so that the identity security authentication of the vehicle and the digital key can be realized, the connection of illegal users is avoided, the safety of vehicle data is improved, and the information security is ensured in a double layer manner.
Based on the security authentication method of the digital key described in the above embodiment, a security authentication method of the digital key will be described below, and the method is applied to a digital key device, as shown in fig. 5, and includes the following steps:
in step S201, a channel characteristic value of wireless communication between the vehicle and the digital key device is extracted.
In step S202, a device fingerprint is generated according to the channel feature value, and after verifying that the vehicle is a preset legal vehicle based on the device fingerprint, a preset security channel between the vehicle and the digital key device is established.
The device fingerprint is already described in the above embodiments, and will not be described here again.
It can be understood that the embodiment of the application needs to verify the legitimacy of the vehicle based on the device fingerprint, and when the vehicle is a legal vehicle, a preset safety channel between the vehicle and the digital key device is established so as to prevent the wrong connection when the vehicle is an illegal vehicle, and the safety of the information in the vehicle cannot be ensured.
In step S203, a session maintenance message is sent to the vehicle at intervals of a preset duration, where the vehicle verifies that the digital key is a preset legal key according to the session maintenance message, and then maintains the preset security channel in a preset session state, otherwise, disconnects the preset security channel.
It can be understood that the digital key sends the session maintenance message to the vehicle at intervals of a preset duration, and the vehicle verifies the validity of the key according to the session maintenance message, where the verification method has already been described in the above embodiment, and will not be described herein again.
According to the safety authentication method of the digital key, the channel characteristic value can be used as the equipment fingerprint according to the difference of the wireless communication channels, the identity validity verification can be carried out on the access of the digital key based on the equipment fingerprint, the illegal access of the digital key to the vehicle is avoided, illegal control and the like, and after the digital key passes the authentication, the message is required to be periodically sent to the vehicle for continuous identity verification, and after the verification passes, the illegal control command is sent by the simulated legal key.
Next, a security authentication device for a digital key according to an embodiment of the present application will be described with reference to the accompanying drawings.
Fig. 6 is a block diagram of a security authentication device for a digital key according to an embodiment of the present application.
As shown in fig. 6, the digital key security authentication device 10 is applied to a vehicle and includes: a first extraction module 101, a first creation module 102 and a first verification module 103.
The first extracting module 101 is used for extracting a channel characteristic value of wireless communication between the vehicle and the digital key device; the first establishing module 102 is configured to generate an equipment fingerprint according to the channel feature value, and establish a preset security channel between the vehicle and the digital key equipment after verifying that the digital key is a preset legal key based on the equipment fingerprint; the first verification module 103 is configured to receive a session maintenance message sent by the digital key device at intervals of a preset duration, and after verifying that the digital key is a preset legal key according to the session maintenance message, keep the preset security channel in a preset session state, or disconnect the preset security channel.
It should be noted that the foregoing explanation of the embodiment of the security authentication method for the digital key is also applicable to the security authentication device for the digital key of this embodiment, and will not be repeated here.
According to the safety authentication device of the digital key, which is provided by the embodiment of the application, the device fingerprint can be generated according to the channel characteristic value of wireless communication between the vehicle and the digital key, the device fingerprint is utilized to establish a safety channel, then standard authentication is carried out, one layer of safety channel is additionally established on the basis of traditional safety authentication, the operation of controlling the vehicle by an illegal user is avoided, and the safety and privacy of information in the communication process are improved; the MAC value can be calculated according to the random number and the time stamp, and the MAC value is compared with the MAC value of the session maintenance message to judge whether the session maintenance message is consistent, so that whether the digital key is legal is judged, a safety channel is established, and the illegal user is prevented from connecting the vehicle to perform the operation of controlling the vehicle; the first identifier sent by the digital key can be decrypted by using the device fingerprint to obtain key information, the vehicle device inquires the key information in the white list, if the key information exists, the device fingerprint is used for encrypting the vehicle identifier, the device fingerprint is used for decrypting the vehicle information, the white list is inquired, after the key information exists, a safety channel is established, and the safety channel is established through double encryption and decryption, so that the safety of vehicle connection is ensured; the two-way identity authentication of the vehicle side and the key side can be used for generating a session key for encrypting/decrypting the vehicle control instruction, so that the identity security authentication of the vehicle and the digital key can be realized, the connection of illegal users is avoided, the safety of vehicle data is improved, and the information security is ensured in a double layer manner.
Fig. 7 is a block diagram of a security authentication device for a digital key according to an embodiment of the present application.
As shown in fig. 7, the security authentication device 20 of the digital key is applied to the digital key, and includes: a second extraction module 201, a second creation module 202 and a second verification module 203.
Wherein, the second extracting module 201 extracts the channel characteristic value of the wireless communication between the vehicle and the digital key device; the second establishing module 202 generates a device fingerprint according to the channel characteristic value, and establishes a preset safety channel between the vehicle and the digital key device after verifying that the vehicle is a preset legal vehicle based on the device fingerprint; the second verification module 203 sends a session maintenance message to the vehicle at intervals of a preset duration, wherein the vehicle verifies that the digital key is a preset legal key according to the session maintenance message, and then keeps the preset security channel in a preset session state, and otherwise, disconnects the preset security channel.
It should be noted that the foregoing explanation of the embodiment of the security authentication method for the digital key is also applicable to the security authentication device for the digital key of this embodiment, and will not be repeated here.
According to the safety authentication device of the digital key, the channel characteristic value can be used as the equipment fingerprint according to the difference of the wireless communication channels, the identity validity verification can be carried out on the access of the digital key based on the equipment fingerprint, the illegal access of the digital key to the vehicle is avoided, illegal control and the like, and after the digital key passes the authentication, the message is required to be periodically sent to the vehicle for continuous identity verification, and the illegal vehicle control command is prevented from being sent by the analog legal key after the verification passes.
Fig. 8 is a schematic structural diagram of a vehicle according to an embodiment of the present application. The vehicle may include:
A memory 801, a processor 802, and a computer program stored on the memory 801 and executable on the processor 802.
The processor 802 implements the security authentication method of the digital key provided in the above embodiment when executing the program.
Further, the vehicle further includes:
a communication interface 803 for communication between the memory 801 and the processor 802.
A memory 801 for storing a computer program executable on the processor 802.
The memory 801 may include high-speed RAM (Random Access Memory ) memory, and may also include non-volatile memory, such as at least one disk memory.
If the memory 801, the processor 802, and the communication interface 803 are implemented independently, the communication interface 803, the memory 801, and the processor 802 may be connected to each other through a bus and perform communication with each other. The bus may be an ISA (Industry Standard Architecture ) bus, a PCI (PERIPHERAL COMPONENT, external device interconnect) bus, or EISA (Extended Industry Standard Architecture ) bus, among others. The buses may be divided into address buses, data buses, control buses, etc. For ease of illustration, only one thick line is shown in fig. 8, but not only one bus or one type of bus.
Alternatively, in a specific implementation, if the memory 801, the processor 802, and the communication interface 803 are integrated on a chip, the memory 801, the processor 802, and the communication interface 803 may communicate with each other through internal interfaces.
The processor 802 may be a CPU (Central Processing Unit ) or an ASIC (Application SPECIFIC INTEGRATED Circuit, application specific integrated Circuit) or one or more integrated circuits configured to implement embodiments of the present application.
The embodiment of the application also provides digital key equipment, which is characterized by comprising: the digital key security authentication method comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the program to realize the digital key security authentication method of the embodiment. .
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or N embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present application, "N" means at least two, for example, two, three, etc., unless specifically defined otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more N executable instructions for implementing specific logical functions or steps of the process, and further implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present application.
It is to be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the N steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. As with the other embodiments, if implemented in hardware, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable gate arrays, field programmable gate arrays, and the like.
Those of ordinary skill in the art will appreciate that all or a portion of the steps carried out in the method of the above-described embodiments may be implemented by a program to instruct related hardware, where the program may be stored in a computer readable storage medium, and where the program, when executed, includes one or a combination of the steps of the method embodiments.
While embodiments of the present application have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the application, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the application.

Claims (5)

1. A method of security authentication of a digital key, the method being applied to a vehicle, wherein the method comprises the steps of:
Extracting a channel characteristic value of wireless communication between the vehicle and the digital key equipment;
Generating equipment fingerprints according to the channel characteristic values, and establishing a preset safety channel between the vehicle and the digital key equipment after verifying that the digital key is a preset legal key based on the equipment fingerprints;
receiving a session maintaining message sent by the digital key equipment at intervals of preset time, and after verifying that the digital key is a preset legal key according to the session maintaining message, maintaining the preset safety channel in a preset session state, otherwise, disconnecting the preset safety channel; the session maintaining message includes a random number, a time stamp, and an identity verification code MAC value of the digital key, and after verifying that the digital key is a preset legal key according to the session maintaining message, the preset security channel is maintained in a preset session state, otherwise, the preset security channel is disconnected, and the method further includes:
checking whether the time stamp meets a preset condition;
if the time stamp meets the preset condition, performing MAC calculation according to the random number and the time stamp to obtain an actual MAC value;
If the actual MAC value is consistent with the MAC value of the session maintenance message, verifying that the digital key is a preset legal key, and keeping the preset safety channel in a preset session state, otherwise verifying that the digital key is a preset illegal key, and disconnecting the preset safety channel; after verifying that the digital key is a preset legal key based on the device fingerprint, establishing a preset safety channel between the vehicle and the digital key device, and further comprising:
encrypting a first identifier of the digital key device by using the device fingerprint to obtain key information;
The key information is sent to the vehicle, wherein the vehicle decrypts the key information according to the equipment fingerprint to obtain the first identifier, queries a first preset white list according to the first identifier, and encrypts the vehicle identifier of the vehicle by using the equipment fingerprint if the digital key is obtained by querying, so as to obtain the vehicle information;
Receiving the vehicle information, decrypting the vehicle information by using the device fingerprint to obtain the vehicle identifier, inquiring a second preset white list according to the vehicle identifier, and if the vehicle is obtained by inquiring, establishing a preset safety channel between the vehicle and the digital key device; before receiving the session maintenance message sent by the digital key device at intervals of preset duration, the method further comprises the following steps:
Transmitting a vehicle-side random number and an IV value to the digital key device, and receiving an application identifier of a digital key, a key-side random number, key information and a key ciphertext generated by encrypting the vehicle-side random number and the key-side random number, which are transmitted by the digital key device;
Calculating a digital key according to the application identifier, the key side random number and the key information, deriving a communication key from the digital key, decrypting the key ciphertext by using the communication key, and encrypting and generating a vehicle end ciphertext according to the counting information of a key counter of the digital key and the vehicle side random number if the decrypted information is consistent with the vehicle side random number and the key side random number;
The vehicle end ciphertext is sent to the digital key device, wherein the digital key device derives a communication key from a digital key, decrypts the vehicle end ciphertext by using the communication key, completes identity security authentication of the vehicle at the key side if the decrypted information is consistent with the counting information of the key counter and the vehicle side random number, calculates to obtain a key side session key according to the communication key, the IV value and the hash value of the vehicle side random number, and encrypts the vehicle side random number by using the key side session key to obtain a session ciphertext;
And calculating according to the communication key, the IV value and the hash value of the vehicle-side random number to obtain a vehicle-side session key, decrypting the session ciphertext by using the vehicle-side session key, and if the decrypted information is consistent with the vehicle-side random number, completing identity security authentication of the digital key on the vehicle side.
2. The method of claim 1, further comprising, prior to extracting the channel characteristic value for wireless communication of the vehicle with the digital key device:
Receiving a pairing request of digital key equipment;
and pairing with the digital key equipment according to the pairing request.
3. A security authentication device for a digital key, the device being applied to a vehicle, wherein the device comprises:
The first extraction module is used for extracting a channel characteristic value of wireless communication between the vehicle and the digital key equipment;
the first establishing module is used for generating equipment fingerprints according to the channel characteristic values, and establishing a preset safety channel between the vehicle and the digital key equipment after verifying that the digital key is a preset legal key based on the equipment fingerprints;
The first verification module is used for receiving a session maintenance message sent by the digital key equipment at intervals of preset time, and after verifying that the digital key is a preset legal key according to the session maintenance message, keeping the preset safety channel in a preset session state, otherwise, disconnecting the preset safety channel; the session maintaining message includes a random number, a time stamp, and an identity verification code MAC value of the digital key, and after verifying that the digital key is a preset legal key according to the session maintaining message, the preset security channel is maintained in a preset session state, otherwise, the preset security channel is disconnected, and the method further includes:
checking whether the time stamp meets a preset condition;
if the time stamp meets the preset condition, performing MAC calculation according to the random number and the time stamp to obtain an actual MAC value;
If the actual MAC value is consistent with the MAC value of the session maintenance message, verifying that the digital key is a preset legal key, and keeping the preset safety channel in a preset session state, otherwise verifying that the digital key is a preset illegal key, and disconnecting the preset safety channel; after verifying that the digital key is a preset legal key based on the device fingerprint, establishing a preset safety channel between the vehicle and the digital key device, and further comprising:
encrypting a first identifier of the digital key device by using the device fingerprint to obtain key information;
The key information is sent to the vehicle, wherein the vehicle decrypts the key information according to the equipment fingerprint to obtain the first identifier, queries a first preset white list according to the first identifier, and encrypts the vehicle identifier of the vehicle by using the equipment fingerprint if the digital key is obtained by querying, so as to obtain the vehicle information;
Receiving the vehicle information, decrypting the vehicle information by using the device fingerprint to obtain the vehicle identifier, inquiring a second preset white list according to the vehicle identifier, and if the vehicle is obtained by inquiring, establishing a preset safety channel between the vehicle and the digital key device; before receiving the session maintenance message sent by the digital key device at intervals of preset duration, the method further comprises the following steps:
Transmitting a vehicle-side random number and an IV value to the digital key device, and receiving an application identifier of a digital key, a key-side random number, key information and a key ciphertext generated by encrypting the vehicle-side random number and the key-side random number, which are transmitted by the digital key device;
Calculating a digital key according to the application identifier, the key side random number and the key information, deriving a communication key from the digital key, decrypting the key ciphertext by using the communication key, and encrypting and generating a vehicle end ciphertext according to the counting information of a key counter of the digital key and the vehicle side random number if the decrypted information is consistent with the vehicle side random number and the key side random number;
The vehicle end ciphertext is sent to the digital key device, wherein the digital key device derives a communication key from a digital key, decrypts the vehicle end ciphertext by using the communication key, completes identity security authentication of the vehicle at the key side if the decrypted information is consistent with the counting information of the key counter and the vehicle side random number, calculates to obtain a key side session key according to the communication key, the IV value and the hash value of the vehicle side random number, and encrypts the vehicle side random number by using the key side session key to obtain a session ciphertext;
And calculating according to the communication key, the IV value and the hash value of the vehicle-side random number to obtain a vehicle-side session key, decrypting the session ciphertext by using the vehicle-side session key, and if the decrypted information is consistent with the vehicle-side random number, completing identity security authentication of the digital key on the vehicle side.
4. A vehicle, characterized by comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor executing the program to implement the method of security authentication of a digital key as claimed in any one of claims 1-2.
5. A digital key device, comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor executing the program to implement the method of security authentication of a digital key as claimed in any one of claims 1-2.
CN202211334015.2A 2022-10-28 2022-10-28 Digital key safety authentication method and device, vehicle and digital key equipment Active CN115690955B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211334015.2A CN115690955B (en) 2022-10-28 2022-10-28 Digital key safety authentication method and device, vehicle and digital key equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211334015.2A CN115690955B (en) 2022-10-28 2022-10-28 Digital key safety authentication method and device, vehicle and digital key equipment

Publications (2)

Publication Number Publication Date
CN115690955A CN115690955A (en) 2023-02-03
CN115690955B true CN115690955B (en) 2024-09-24

Family

ID=85045448

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211334015.2A Active CN115690955B (en) 2022-10-28 2022-10-28 Digital key safety authentication method and device, vehicle and digital key equipment

Country Status (1)

Country Link
CN (1) CN115690955B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118450352B (en) * 2024-07-08 2024-09-24 中汽智联技术有限公司 Internet of vehicles management method and system based on digital key

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106793163A (en) * 2016-12-22 2017-05-31 上海摩软通讯技术有限公司 Wearable device, communication system and communication means
CN111555869A (en) * 2020-04-27 2020-08-18 东南大学 A method and system for active channel key generation in a MIMO-OFDM system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113346989B (en) * 2020-03-02 2023-02-07 北京新能源汽车股份有限公司 External device access authentication method and device, gateway and electric vehicle
CN113920616B (en) * 2020-06-24 2023-08-08 广州汽车集团股份有限公司 Method for safe connection between vehicle and bluetooth key, bluetooth module, bluetooth key
CN114390522A (en) * 2020-10-21 2022-04-22 展讯通信(上海)有限公司 Network equipment validity identification method and device, storage medium, terminal equipment and base station
CN112422280B (en) * 2020-11-12 2024-09-17 北京安御道合科技有限公司 Man-machine control interaction method, interaction system, computer equipment and storage medium
CN113395406B (en) * 2021-06-23 2024-02-13 中国电力科学研究院有限公司 Encryption authentication method and system based on power equipment fingerprint
CN113658360B (en) * 2021-08-18 2022-05-10 安徽江淮汽车集团股份有限公司 Digital key safety control method for vehicle
CN113613214B (en) * 2021-08-31 2023-07-21 重庆长安汽车股份有限公司 In-vehicle message authentication key management method and readable storage medium
CN114333113B (en) * 2021-12-28 2023-05-12 重庆长安汽车股份有限公司 Bluetooth key shortcut control method based on negative one screen and computer readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106793163A (en) * 2016-12-22 2017-05-31 上海摩软通讯技术有限公司 Wearable device, communication system and communication means
CN111555869A (en) * 2020-04-27 2020-08-18 东南大学 A method and system for active channel key generation in a MIMO-OFDM system

Also Published As

Publication number Publication date
CN115690955A (en) 2023-02-03

Similar Documents

Publication Publication Date Title
CN109076078B (en) Method for establishing and updating a key for secure on-board network communication
CN105516103B (en) Method, device and system for binding intelligent household electrical appliance
US8526606B2 (en) On-demand secure key generation in a vehicle-to-vehicle communication network
CN106357400B (en) Establish the method and system in channel between TBOX terminal and TSP platform
US10477402B2 (en) One-way key fob and vehicle pairing
CN110990827A (en) Identity information verification method, server and storage medium
CN107493561B (en) Shared device unlocking method, device and system and storage medium
CN111083696B (en) Communication verification method and system, mobile terminal and vehicle machine side
CN112396735B (en) Internet automobile digital key safety authentication method and device
CN111447601A (en) Method and device for realizing automobile Bluetooth key
CN101541007A (en) An improved method for an authentication of a user subscription identity module
CN107864124B (en) Terminal information security protection method, terminal and Bluetooth lock
CN107733636B (en) Authentication method and authentication system
CN105828332A (en) Method of improving wireless local area authentication mechanism
CN111601280B (en) Access verification method and device
CN110738776B (en) Method and system for opening Bluetooth access control, Bluetooth device and working method thereof
CN113392401A (en) Authentication system
CN114696998B (en) Identity authentication method, device and system
CN115690955B (en) Digital key safety authentication method and device, vehicle and digital key equipment
CN103152326A (en) Distributed authentication method and authentication system
CN111080856A (en) Bluetooth entrance guard unlocking method
CN111601312B (en) Block link access authentication method, Internet of vehicles terminal and operator system
CN109472890A (en) intelligent lock and intelligent lock control method
CN113115255A (en) Certificate issuing method, secret key authentication method, vehicle unlocking method, equipment and storage medium
CN110807854A (en) Unlocking strategy configuration method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant